Network Fundamentals
VPN
Data Transmission
Data Transmission
Network Standards
100

The OSI layer responsible for representing data in a format that can be understood by applications

Presentation Layer

100

allows remote users to securely access a private network over a public network

Virtual Personal Network (VPN)
100

a standardized set of rules and procedures for transmitting data over a network

Protocol

100

a situation where the amount of traffic on a network exceeds its capacity, resulting in slow or delayed transmission of data

Congestion

100

a security device that monitors and controls network traffic between the network and the internet.

Firewall

200

Network that provides access to high-speed storage devices such as hard drives and tape libraries

Storage Area Network (SAN)

200

It is responsible for establishing the encrypted connection to the remote server and providing access to the VPN.

VPN Client

200

Three parts of a data packet

Header, Payload, Trailer

200

Helps the receiving device to verify the integrity of the data in the packet and to detect any errors that may have occurred during transmission.

Trailer

200

These are the hardware components that enable devices to connect to the wireless network

Network Interface Cards (NICs)

300

It lets network administrators group devices together based on logical connections

Virtual Local Area Network (VLAN)

300

can reduce costs associated with expensive private networks and leased lines

VPN Cost Savings

300

What happens at the end of packet switching

Misordered packets are reordered to original form

300

What is the primary advantage of copper twisted pair cable?

Low Cost

300

a physical path that directs and confines signals for data transmission

Guided Medium

400

Though rarely used today, this device lacks intelligence and sends incoming data to all outputs, unlike its more efficient successor.

Hub

400

the process of encapsulating one protocol within another protocol for secure data transmission over an insecure network

Tunneling

400

a situation where two or more devices or processes are unable to proceed because they are waiting for each other to release a resource or complete a task

Deadlock

400

What is the bisection (two types) of compression techniques

Lossless and lossy

400

a wireless communication technology that uses light, typically from LED bulbs, to transmit data

LiFi

500

A device that blindly forwards incoming network data to all connected devices, regardless of destination.

Hub

500

method used to establish and maintain the secure connection between the client and the server

VPN Protocol

500

interference from one cable to another

Crosstalk

500

The weakening or loss of signal strength as it travels through a medium

Signal Attenuation

500

These systems can be used to prevent attacks by blocking suspicious traffic, such as Denial of Service (DoS) attacks.

Intrusion Detection and Prevention Systems